Hi Viktor,
* Viktor Rosenfeld <[EMAIL PROTECTED]> [24. Jul. 2002]:
> David T-G wrote:
> > ...and then Phil Gregory said...
> > % encrypt-to <your key ID>
> > % 
> > % to your ~/.gnupg/options file.  This leaves them encrypted on disk but
> > % still allows you to go back and look at them.
> > 
> > ... and allows anyone who knows your keyid to know that the message has
> > been encrypted to your key as well, thereby making the message very
> > not-anonymous.  Just so you're aware...
> 
> Hmm, good point.  Then again, I almost always sign my messages anyway,
> so the key id is there in any case.  But the idea with a secred,
> unpublished key is nice.

Pgp/gpg first sign then encrypt. So only the repicient can check
the sig (after encrypting the message).

With gnupg you may even use

       --throw-keyid
                 Do not put the keyid into encrypted packets.
                 This option hides the receiver of the message and
                 is a countermeasure against traffic analysis.  It
                 may slow down the decryption process because all
                 avail- able secret keys are tried.



So it is possible to send messages encrypted, signed and anonymously.

Ciao, Gregor
-- 
"The future is here. It's just not widely distributed yet."
-- William Gibson

Reply via email to